Internet
Fact-checked

At EasyTechJunkie, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What is a Man in the Browser Attack?

Malcolm Tatum
Malcolm Tatum
Malcolm Tatum
Malcolm Tatum

A man in the browser attack is an application that is capable of stealing login credentials, account numbers, and various other types of financial information. The attack combines the use of Trojan horses with a unique phishing approach to insinuate a window that overlays the browser on a given computer. The presence of the Trojan horse is transparent to the user, as it does not interfere with the normal use of the browser to visit web sites and engage in transactions on those sites.

These attacks are designed to capture confidential information that can be used to the advantage of the entity that launched the attack. As part of the function, the man in the browser process begins with the establishment of the Trojan on the hard drive. The Trojan embeds in a file and is often hard to isolate. Once the Trojan is in place, the virus launches a transparent overlay on the browser that is unlikely to be detected.

Login credentials, account numbers and financial information might be the target of a cyber attack.
Login credentials, account numbers and financial information might be the target of a cyber attack.

Unlike more traditional phishing methods that employ links in the body of emails to direct users to fake web sites and prompt them to enter secure data, the man in the browser simply captures data as the user enters it. The user is completely unaware of that the data is being hijacked, since he or she is interacting with a legitimate site. The attack does not interfere with the transaction in any way at this point.

Unlike more traditional phishing methods that direct users to fake web sites and prompt them to enter secure data, the man in the browser simply captures data as the user enters it.
Unlike more traditional phishing methods that direct users to fake web sites and prompt them to enter secure data, the man in the browser simply captures data as the user enters it.

Once the data is captured, the entity that created and distributed the attack receives the collection of security codes, credit card numbers, or bank account login information and can begin to use it for a wide range of purposes. The victim may not be aware of the problem until several credit cards have been used or the balance in the checking account begins to drop unexpectedly.

Part of the frustration with a man in the browser attack is that the bug is very hard to detect and even harder to remove from the system. Unlike many other forms on intrusive viruses, the invader operates between the browser security protocols and the input of the user. This means that standard security measures normally will not even reveal the presence of the virus.

Malcolm Tatum
Malcolm Tatum

After many years in the teleconferencing industry, Michael decided to embrace his passion for trivia, research, and writing by becoming a full-time freelance writer. Since then, he has contributed articles to a variety of print and online publications, including EasyTechJunkie, and his work has also appeared in poetry collections, devotional anthologies, and several newspapers. Malcolm’s other interests include collecting vinyl records, minor league baseball, and cycling.

Learn more...
Malcolm Tatum
Malcolm Tatum

After many years in the teleconferencing industry, Michael decided to embrace his passion for trivia, research, and writing by becoming a full-time freelance writer. Since then, he has contributed articles to a variety of print and online publications, including EasyTechJunkie, and his work has also appeared in poetry collections, devotional anthologies, and several newspapers. Malcolm’s other interests include collecting vinyl records, minor league baseball, and cycling.

Learn more...

Discussion Comments

anon29216

"Once in place, the Trojan is in place, the virus launches a transparent overlay on the browser that is highly likely to be detected. "

Surely you don't mean 'unlikely to be detected'?

Post your comments
Login:
Forgot password?
Register:
    • Login credentials, account numbers and financial information might be the target of a cyber attack.
      By: bloomua
      Login credentials, account numbers and financial information might be the target of a cyber attack.
    • Unlike more traditional phishing methods that direct users to fake web sites and prompt them to enter secure data, the man in the browser simply captures data as the user enters it.
      By: roberto lunerti
      Unlike more traditional phishing methods that direct users to fake web sites and prompt them to enter secure data, the man in the browser simply captures data as the user enters it.